scientific article; zbMATH DE number 1088242

From MaRDI portal
Publication:4364559

zbMath1059.94527MaRDI QIDQ4364559

Ueli M. Maurer, Christian Cachin

Publication date: 1997


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Separating adaptive streaming from oblivious streaming using the bounded storage modelFine-grained secure computationOn the (im)possibility of non-interactive correlation distillationSecure multiparty computation in the bounded storage modelEverlasting UC commitments from fully malicious PUFsIncompressible cryptographyAuthentication in the bounded storage modelInteractive non-malleable codesLong-term security and universal composabilityRate-1 incompressible encryption from standard assumptionsSpeak much, remember little: cryptography in the bounded storage model, revisitedOne-way functions using algorithmic and classical information theoriesAspects concerning entropy and utilityQuantum cryptography beyond quantum key distributionUnnamed ItemLong term confidentiality: a surveyPublic-key cryptography based on bounded quantum reference framesUsing quantum key distribution for cryptographic purposes: a surveyBasing Weak Public-Key Cryptography on Strong One-Way FunctionsFine-grained cryptography revisitedNon-interactive timestamping in the bounded-storage modelTight time-space lower bounds for finding multiple collision pairs and their applicationsAnalyzing security protocols using time-bounded task-PIOAsFine-Grained CryptographyA New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public KeysBit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal ConstructionThe Symbiosis between Collision and Preimage ResistanceBig-Key Symmetric Encryption: Resisting Key ExfiltrationA Single Initialization Server for Multi-party CryptographyResource-restricted cryptography: revisiting MPC bounds in the proof-of-work eraOn the streaming indistinguishability of a random permutation and a random function